Blogs Home - Tags - ibm-security urn:lsid:ibm.com:blogs:entries252014-08-07T06:43:26-04:00IBM Connections - Blogsurn:lsid:ibm.com:blogs:entry-28074183-89ea-4757-8c16-adbe4e12fecbTop reasons why customers still bet their business on the mainframeMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-05-31T08:31:53-04:002013-07-03T15:12:06-04:00<p dir="ltr">
<em>This post is written by <strong>Anne Lescher</strong>, Product Marketing Manager with IBM Security Solutions.</em></p>
<p dir="ltr">
<img alt="Mainframe Security - Top reasons why customers still bet their business on the mainframe" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/security_why-customers-still-bet-their-business-on-mainframe.jpg" style=" display:block; margin: 1em 1em 0pt 0pt; float: center;" /></p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
It seems like everyone is rushing to keep up with the latest IT innovations supporting our business operations. &nbsp;There is pressure to implement hot new state-of-the-art technologies supporting BYOD (Bring Your Own Device), cloud computing, mobile applications, social media, and data analytics all while allowing access to business partners, vendors and customers on the internet. &nbsp;But these technologies can introduce a new set of threats and risks to your business environment.</p>
<p dir="ltr">
&nbsp;</p>
<h2 dir="ltr">
Is the mainframe the perfect platform on which to implement these new technologies?</h2>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
Many businesses overlook the potential of the mainframe as a flexible secure foundation for these new applications. &nbsp;They forget the advantages that originally drew them to the mainframe such as security, data protection, system integrity, privacy, auditability, availability, business recovery, scalability, performance and more.&nbsp; They forget that the mainframe can provide a strong security platform to build on that integrates hardware encryption, system architecture, operating system design, security software and secure middleware to protect applications and data.</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
In a recent Forrest survey commissioned by IBM, security leaders across North American and Western Europe were questioned about their company&rsquo;s information security preferences.&nbsp;&nbsp; The results of that survey remind us of the strengths that keep major Fortune 1000 companies running their production systems and data warehouses on the mainframe. &nbsp;Here are some sample findings from the Forrester survey:</p>
<p dir="ltr">
&nbsp;</p>
<ul dir="ltr">
<li>
97% percent of executives surveyed said that information security is highly critical to their company&rsquo;s ability to compete in their market or industry</li>
<li>
91% percent of executives surveyed said that their company&rsquo;s brand could be harmed if client and partner data was not handled securely</li>
<li>
88% percent of respondents felt that regulatory authorities are increasing the information security requirements for these companies&rsquo; applications and infrastructure</li>
<li>
65% percent of executives surveyed agreed that they have too many point security solutions</li>
<li>
More than 90% of those surveyed and interviewed for this research felt that using a platform that has security natively designed into its architecture made the most sense</li>
<li>
87% percent of research participants recognized the mainframe as their most available, scalable, and secure platform.</li>
</ul>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
The survey includes customer concerns on regulatory compliance, increased complexity in security management, essential characteristics and features of security platforms, and additional results we think you will find interesting. Especially the conclusion that:</p>
<p dir="ltr">
&ldquo;The Modern Mainframe Shines As A Secure Application Platform&rdquo;</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
Please also read the entire new Forrester Though Leadership Paper called <a href="https://www.ibm.com/services/forms/signup.do?source=swg-103GS10W" target="_new"><strong>Secure The Enterprise With Confidence Using A Mainframe Infrastructure.</strong></a><strong> </strong></p>
<p dir="ltr">
&nbsp;</p>
<script language="javascript">
location.replace("http://securityintelligence.com/top-reasons-why-customers-still-bet-their-business-on-the-mainframe/);
</script>
<meta http-equiv="refresh" content="0; url=http://securityintelligence.com/top-reasons-why-customers-still-bet-their-business-on-the-mainframe/">This post is written by Anne Lescher , Product Marketing Manager with IBM Security Solutions.
&nbsp;
It seems like everyone is rushing to keep up with the latest IT innovations supporting our business operations. &nbsp;There is pressure to...006266urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-e2e1d7cf-f90b-4d59-a5a6-1a34da418ba9Opportunity begets reality: The evolution of threats on the internetBryan CaseyBFCASEY@US.IBM.COM270003BSJVactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-05-07T14:56:31-04:002013-05-31T12:02:45-04:00<p dir="ltr">
Today, there is a greater understanding of cyber security risks and challenges than ever before because it is hard to go even a single day without reading a story about an organization that has been breached.&nbsp; For many people the challenges around internet and computer security are also ones that hit close to home as identity theft and credit card fraud can seem almost commonplace.<br />
<br />
Threats have made the transition to the digital world because it is simply a better means of accessing an end.&nbsp; Organized crime, sabotage, espionage, terrorism, civil disobedience and the theft of intellectual property are all issues that have moved from the physical world to the digital one because our investment in the internet has made these cyber attacks on people, networks and systems both possible and effective. &nbsp;<br />
<br />
This trend is only going to continue because the unfortunate reality is that for attackers it is almost always preferable to be in front of a computer than physically at the scene of an incident. &nbsp;</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<span style="font-size:14px;"><strong>The increasing sophistication of attacks </strong></span><br />
<br />
The two decades of the commercial internet can really be broken up into two decades of security threats.&nbsp; Much of the attack activity we saw during the early days of the internet was without focus, it was opportunistic and there was very little specific targeting of systems, organizations and individuals. &nbsp;</p>
<p dir="ltr">
<br />
<object height="315" width="560"><param name="movie" value="http://www.youtube.com/v/LfIZSlxrovs?hl=en_US&amp;version=3" /><param name="allowFullScreen" value="true" /><param name="allowscriptaccess" value="always" /><embed allowfullscreen="true" allowscriptaccess="always" height="315" src="http://www.youtube.com/v/LfIZSlxrovs?hl=en_US&amp;version=3" type="application/x-shockwave-flash" width="560"></embed></object></p>
<p dir="ltr">
<br />
As a result, the security technology most companies deployed only needed to be as good or better than one&#39;s peers. If the attack is opportunistic, your organization needed to be a slightly more difficult opportunity. &nbsp;<br />
<br />
Today, all that has changed and the data and systems we have now exposed to the internet have produced new opportunities for illegal and criminal activity, and that opportunity has produced an associated class of attackers that are well-funded, motivated and often times very innovative.&nbsp; They conduct reconnaissance, are more operationally proficient, frequently use custom, never before seen malware and will often do whatever they can to mask and hide their activity. &nbsp;</p>
<p dir="ltr" style="text-align: center;">
&nbsp;</p>
<p dir="ltr" style="text-align: center;">
<strong><a href="http://www-03.ibm.com/security/solution/intelligence-big-data/" target="_blank"><em>On the web: security intelligence with big data</em></a></strong></p>
<p dir="ltr">
<br />
<br />
To warrant this type of effort, the types of data they target is also the data the organizations frequently consider to be most critical.<br />
<br />
Essential to detecting and defending against sophisticated threats in both the physical and digital world is intelligence.&nbsp; If an attacker isn&#39;t going to merely give up if their first, second or thirtieth attack gets blocked, we have to adopt strategies designed to assemble a more complete picture of the threat. &nbsp;</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<span style="font-size:14px;"><strong>The role of security analytics and intelligence</strong></span><br />
<br />
This is where we are seeing the convergence of internet and computer security with the big data and analytics space.&nbsp; The reality is that most organizations have an incredible amount of data relevant to security.&nbsp; They have data about threats on the internet, users and where they are going, about system configurations, about attack activity constantly peppering firewalls and intrusion prevention systems, about applications and their security vulnerabilities, about who is accessing what data, and then where that data is going. &nbsp;<br />
<br />
Each of the actions an attacker takes as they move within an organization produces small, digital footprints and these footprints are the pieces of data that security teams are trying to do identify and combine to better understand the attack. &nbsp;<br />
<br />
We work with some organizations that see over two billion security events every day and while you might believe such a number makes managing security impossible, the irony is that the more data we collect, the fewer incidents that actually require investigation.&nbsp; The more we understand about what is normal and what is not normal within an environment, the more clarity we have and the better we can identify deviations and incidents that require priority investigation and response.</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr" style="text-align: center;">
<strong><a href="http://insight.q1labs.com/ExtendingSecurityIntelligencewithBigData.html" target="_blank"><em>Whitepaper:&nbsp;Extending&nbsp;security&nbsp;intelligence&nbsp;with&nbsp;big&nbsp;data</em></a></strong></p>
<p dir="ltr">
<br />
Today it isn&#39;t good enough to merely block an attack, we are trying to understand as much as possible about who is attacking us, what tactics they are using and then developing a real understanding of what they are after and how to stop them before they get there. &nbsp;</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<span style="font-size:14px;"><strong>Building for the future- new insights from big data</strong></span><br />
<br />
For many of the most advanced and forward looking organizations, the next step will be combing security data with other sets of data that had never previously been considered relevant, things like business process data and baselines around normal financial transaction behavior.&nbsp; If today&#39;s attackers are after the most critical data and systems, it means security intelligence will need to evolve to include a more complete understanding of the business and the processes within it. &nbsp;</p>
<p dir="ltr">
<br />
<object height="315" width="560"><param name="movie" value="http://www.youtube.com/v/k84vLXPDhgA?version=3&amp;hl=en_US" /><param name="allowFullScreen" value="true" /><param name="allowscriptaccess" value="always" /><embed allowfullscreen="true" allowscriptaccess="always" height="315" src="http://www.youtube.com/v/k84vLXPDhgA?version=3&amp;hl=en_US" type="application/x-shockwave-flash" width="560"></embed></object></p>
<p dir="ltr">
<br />
If the attackers are going to continue to become more sophisticated and if the volume and variety of relevant security data is going to continue to explode, <strong>there are two essential questions organizations need to be asking themselves.&nbsp; </strong></p>
<ol dir="ltr">
<li>
First, am I designing a strategy that welcomes and embraces more data from every relevant source imaginable?&nbsp;</li>
<li>
Second, if the keys to detecting and defending against the threats of the future will be understanding and connecting data, am I building a new set of security skills within my organization that will position me for success not just today, but five years from now?<br />
&nbsp;</li>
</ol>
<p dir="ltr">
For more information from around IBM and the security world more generally, please feel free to follow me on Twitter: <u><a href="https://twitter.com/bryancasey_">@BryanCasey_</a></u></p>
Today, there is a greater understanding of cyber security risks and challenges than ever before because it is hard to go even a single day without reading a story about an organization that has been breached.&nbsp; For many people the challenges around...002215urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-ae5deb5d-ff3b-4b7e-a3e0-f96763ce3160Security is a multi-dimensional puzzleMarcel Santillimsantil@us.ibm.com270002FABMactiveComment Entriesapplication/atom+xml;type=entryLikes2013-04-26T15:52:48-04:002013-04-26T15:52:48-04:00<p dir="ltr">
<em>Post by <strong>Nataraj Nagaratnam (<a href="https://twitter.com/n_nataraj" target="_blank">@n_nataraj</a>)</strong></em><br />
&nbsp;</p>
<p dir="ltr">
We are all witnessing how technology impact business, and how this is shaping up the future of enterprise IT. Current and emerging technologies - mobile, cloud, big data, social - help businesses innovate, and dynamically engage with their clients in new and innovate ways. At the same time, we also see these raise questions about risk and security.</p>
<p dir="ltr">
&nbsp;</p>
<ul dir="ltr">
<li>
How can we enterprises embrace a mobile strategy so that they can quickly deliver secure mobile applications?</li>
<li>
Who do you know and who do you trust in this age where each of us have different digital identities and&nbsp; representing our personal, enterprise, and social personas?</li>
<li>
How can you have protection and monitoring around application workloads in a cloud environment?</li>
<li>
How can high value data asset be secured and monitored?&nbsp;</li>
</ul>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
If you think about it .. security is a multi-dimensional puzzle - across People, Application, Data, and Infrastructure.&nbsp; While siloed technologies may not provide a holistic view, we believe that every enterprise needs Security Intelligence that gives better view of their security and risk posture.<br />
<br />
<a href="http://ibm.co/17OH3RS" target="_blank">Next&nbsp;week&nbsp;at&nbsp;the&nbsp;IMPACT&nbsp;conference&nbsp;at&nbsp;Las&nbsp;Vegas</a>, we will be discussing many of these topics, share our point of view, and hear from you about what you see happening. Please join us in at the security sessions - be it about security intelligence, mobile security, identity, or security on expert integration systems, as well as at our security peds at the Expo center.<br />
<br />
I look forward to meeting you in person, discuss about trends or your security challenges, and helping you adopt technology shift with confidence!</p>
<p dir="ltr">
&nbsp;</p>
<hr dir="ltr" />
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<a href="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/Nataraj-Nagaratnam_IBM-Security-CTO.jpg" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/Nataraj-Nagaratnam_IBM-Security-CTO.jpg" style="display: block; margin: 1em 10px 0pt; float: left;" /></a><strong><span style="font-size:18px;">Dr. Nataraj (Raj) Nagaratnam</span></strong><br />
Dr. Nataraj (Raj) Nagaratnam is an IBM Distinguished Engineer and Chief Technology Officer for Security Solutions in IBM Security Systems. In this role, Raj leads cross IBM technical strategy for security solutions including mobile security, and cloud security; drives integration and innovation projects. During his career at IBM, as chief architect, he has lead architectural efforts for security portfolio in identity and access management, and prior to that security architecture for WebSphere Platform. He was also the CTO for India Software Lab focused on building technical leadership and collaborative innovation. He leads and participates in various open standards activities. He has authored and co-authored numerous journal articles, papers, security standards specifications, and books, including the book on &ldquo;Enterprise Java Security&rdquo; published by Addison Wesley. Nataraj received his Ph.D. in Computer Science from Syracuse University.</p>
Post by Nataraj Nagaratnam ( @n_nataraj )
&nbsp;
We are all witnessing how technology impact business, and how this is shaping up the future of enterprise IT. Current and emerging technologies - mobile, cloud, big data, social - help businesses...003763urn:lsid:ibm.com:blogs:entries-3404f8c4-d29c-4d8e-a7dd-f93b13530a6bIBM Impact Blog2015-03-02T21:16:06-05:00urn:lsid:ibm.com:blogs:entry-378f2d9f-4576-4125-9aea-6b4e510d3af0Infosecurity Europe 2013: Day 3 ThoughtsMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-04-25T12:36:49-04:002013-07-03T15:59:36-04:00<p dir="ltr">
<a href="http://www-01.ibm.com/software/uk/security/infosec/index.html" style="width: 100%; display: inline-block;" target="_blank"><img alt="IBM Security at Infosec Europe 2013" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/ibm-infosec-uk-europe_2013_day3.jpg" style=" display:block; margin: 0 auto;text-align: center;" /></a></p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
As the third day came to a close on <strong>Infosecurity Europe</strong> and our stand is now slowly being taken down, I wanted to provide some key highlights of the whiteboarding sessions that happened live on our interactive graffiti wall.<br />
&nbsp;</p>
<h2 dir="ltr">
<strong>How to Protect your Crown Jewels</strong></h2>
<p dir="ltr">
First up was David Gray from our business Partner, Satisnet, who delved into the topic of protecting your &ldquo;crown jewels&rdquo; with Security Intelligence. David started by talking about the general security ecosystem and the need to have intelligence/monitoring of firewalls, IPS, authentication and patch management. David also then talked about having to have knowledge on external threats such as Advanced Persistent Threats.<br />
&nbsp;</p>
<p dir="ltr">
He then finished his session by showing and discussing how IBM Security QRadar SIEM is able to monitor and correlate different machine/log types to provide total Security Intelligence. To find out more download the <a href="http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=SP&amp;infotype=PM&amp;appname=SWGE_WG_WG_USEN&amp;htmlfid=WGD03021USEN&amp;attachment=WGD03021USEN.PDF" target="_blank">IBM Security QRadar SIEM datasheet</a>.<br />
&nbsp;</p>
<p dir="ltr">
<img align="middle" border="0" height="277" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/blog_day3_0clip_image002.gif" width="520" /><br />
&nbsp;</p>
<h2 dir="ltr">
<strong>Secure by Design</strong></h2>
<p dir="ltr">
Next up to the stand was Peter Vincent who took control of the graffiti wall to engage the audience on Secure by Design. Peter started off by talking about getting things right at the start of the application development cycle to save time, effort and money later on down the line. He gave an example that something that may cost you $50 in development to design, will cost you much more if having to fix in production.<br />
&nbsp;</p>
<p dir="ltr">
Peter then highlighted the need for security architectural principles, such as: defence in depth, leased privilege and secure by default. He closed by telling the audience that the underlying prerequisite for <a href="https://www14.software.ibm.com/webapp/iwm/web/signup.do?source=swg-spsm-tiv-sec-rp&amp;S_PKG=The-IBM-Secure-Engineering-Framework" target="_blank"><strong>Secure by Design</strong> is the need for organizations to strong technical governance in place and by in from all stakeholders</a>.<br />
&nbsp;</p>
<p dir="ltr">
<img border="0" height="256" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/blog_day3_0clip_image004.gif" width="477" /><br />
&nbsp;</p>
<h2 dir="ltr">
<strong>What are the security risk and how to defend against them?</strong></h2>
<p dir="ltr">
The afternoon session started with Salva Sinno presenting &ldquo;What are the security risks and how to defend against them?&rdquo; Salva started by asking the audience if they have any security on their SAN (Storage Area Network) System. The response from the audience confirmed that organisations&rsquo; today focus on IP security not on SAN because they assume that the Fibre Channel Network can not be attacked.</p>
<p dir="ltr">
Then Salva continued by giving an example of how this is a false assumption and that the Fibre Channel Network are vulnerable to traits such as WWN Spoofing, SNS Vulnerability and Fabric Port Address Spoofing. He closed presenting a set of techniques and good practice that can be used to secure the Fibre Channel and the SAN infrastructure and should guide the selection of the hardware when building an enterprise SAN System.<br />
&nbsp;</p>
<p dir="ltr">
<img border="0" height="277" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/blog_day3_0clip_image006.gif" width="518" /><br />
&nbsp;</p>
<p dir="ltr">
&nbsp;</p>
<h2 dir="ltr">
Database Security &amp; Auditing: How to protect your most valuable assets and meet compliance requirements</h2>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
Our final session was Brian Flasck who in his 15 minutes highlighted to the audience how to protect your most valuable assets and meet compliance requirements through database security and auditing. Brian started by saying that most companies recognise today that the traditional approach of delegating responsibility for database security and auditing to the DB operations team has numerous disadvantages.<br />
&nbsp;</p>
<p dir="ltr">
He discussed how using inbuilt native DB logging tools is insecure and severely degrades the performance of databases and applications and this is why many organisations are turning to IBM, who provide a solution that gives them full visibility and security over their core databases, but without the performance impact traditionally associated with database auditing Brian finished by talking about one of the most common concerns today of IT security and risk managers, privileged user access to sensitive databases. Security and compliance standards now require full visibility of users such as DBA&rsquo;s, sysadmins, and developers, but this needs to be accomplished in a way that does not impact system performance and provides segregation of duties expected by auditors.<br />
&nbsp;</p>
<p dir="ltr">
<img border="0" height="258" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/blog_day3_0clip_image008.gif" width="483" /><br />
<br />
&nbsp;<br />
If you were unable to come to any of our sessions over the last three days but are interested in finding out more about IBM Security Systems, please visit <a href="http://ibm.co/1106Bdy">http://ibm.co/1106Bdy</a>. Catch up on my blogs for an overview of the last two days at the event, <strong>Day 1 (<a href="http://ibm.co/infosecday1">http://ibm.co/infosecday1</a>)</strong> and <strong>Day 2 (<a href="http://ibm.co/infosecday2">http://ibm.co/infosecday2</a>)</strong>.<br />
&nbsp;</p>
<p dir="ltr">
Please follow <a href="http://twitter.com/ibmsecurity" target="_blank">@IBMSecurity</a> for more information specifically on our security events, news, collateral and more.<br />
&nbsp;<br />
If you attended the event, I hope you enjoyed it as much as I did. See you next year!!</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr" style="text-align: center;">
<span style="font-size:16px;"><strong><span style="color: rgb(255, 0, 0);">Update</span>:<br />
<a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-one" target="_blank"><strong>R</strong>ead&nbsp;my&nbsp;thoughts&nbsp;from&nbsp;day&nbsp;1</a></strong></span><br />
<span style="font-size:16px;"><strong><a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-two" target="_blank" text="undefined"><strong>R</strong>ead&nbsp;my&nbsp;thoughts&nbsp;from&nbsp;day 2</a></strong></span></p>
<p dir="ltr">
&nbsp;</p>
<hr dir="ltr" />
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" style="display: block; margin: 1em 10px 0pt; float: left; width: 120px; height: 120px;" /></a><br />
<span style="font-size:18px;"><strong>Tom Kendall</strong></span></p>
<p dir="ltr">
Tom joined the IBM Security Systems marketing team through the acquisition of Q1 Labs team. He was the EMEA Marketing Team Lead for Q1 Labs and worked on the demand generation and channel partner marketing programmes. Tom moved into the WW Marketing team for IBM Security Systems and has been the lead for Demand Generation in Threat and Security Intelligence, and has taken on the role of the IMT first role for Europe. Before joining IBM, Tom worked for 8 years in the advertising industry in London, working on media strategies for large enterprise clients.</p>
<p dir="ltr">
&nbsp;</p>
<script language="javascript">
location.replace("http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/);
</script>
<meta http-equiv="refresh" content="0; url=http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/">
&nbsp;
As the third day came to a close on Infosecurity Europe and our stand is now slowly being taken down, I wanted to provide some key highlights of the whiteboarding sessions that happened live on our interactive graffiti wall.
&nbsp;
How...002862urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-53637e90-9e3a-49b0-bf92-e483923a7ac6Infosecurity Europe 2013: Day 2 ThoughtsMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-04-24T12:54:31-04:002013-07-03T15:59:51-04:00<p dir="ltr">
<a href="http://www-01.ibm.com/software/uk/security/infosec/index.html" style="width: 100%; display: inline-block;" target="_blank"><img alt="IBM Security at Infosec Europe 2013" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/ibm-infosec-uk-europe_2013_day2.jpg" style=" display:block; margin: 0 auto;text-align: center;" /></a><br />
<br />
&nbsp;</p>
<p dir="ltr">
IBM Security Systems had another great day at Infosecurity Europe, with good attendance at our stand for the hourly interactive graffiti whiteboarding sessions, which covered all the hottest security topics.<br />
&nbsp;</p>
<p dir="ltr">
In our workshops we had four successful sessions, allowing attendees insights into Security Intelligence, Mobile and Future thinking. Here are my thoughts on the key points raised in these sessions.<br />
&nbsp;</p>
<p dir="ltr">
We kicked off with Simon McDowell and Chris Payne from business partner, <a href="http://www.satisnet.co.uk/q1labs.html" target="_blank">Satisnet</a>, presenting &quot;Total Intelligence and Visibility for Today&rsquo;s Security Ecosystems&quot;.<br />
They started with informing the audience how important it was to apply intelligence to any of an organisations data sources to gauge/highlight the key incidents that they should act upon as a priority.<br />
&nbsp;</p>
<p dir="ltr">
To show this in practice the team from Satisnet went through a number of different security scenarios and showed how IBM Security QRadar SIEM provides real-time visibility for threat detection and prioritization. This included identifying data leakage where they highlighted when a suspect malware was come into the network.<br />
They finished by going into detail on their success studies with <strong><a href="http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=SP&amp;infotype=PM&amp;appname=SWGE_WG_WG_USEN&amp;htmlfid=WGD03021USEN&amp;attachment=WGD03021USEN.PDF" target="_new">IBM Security QRadar SIEM</a></strong> and how they have helped overcome a range of security problems with a leading law firm, a large global defence contractor and a major high street retail bank.<br />
&nbsp;</p>
<h2 dir="ltr">
Manage and secure your mobile enterprise: Delivering visibility and confidence</h2>
<p dir="ltr">
A late change in presenters meant Neil Warburton was next up to present &ldquo;Manage and secure your mobile enterprise: Delivering visibility and confidence&rdquo;. Neil started by analysing the unique management and security challenges that organizations face with mobile devices. This included how mobile devices are shared more often, how they have multiple personas (used as a work tools, as well as personal) and also that they are used in many more locations (anywhere, anytime).<br />
&nbsp;</p>
<p dir="ltr">
He then went into detail on having clear process/policies in place and that managing and securing access in a mobile environment is a lot more than locking down the smartphones and tablets. For example, are you officially going to support BYOD throughout and outside your enterprise? Are there any limitations on who can access what application or resource and, from where, on what device/OS? Are you prepared to support access to more than just email and calendar on mobile devices? How will your mobile strategy impact employees, customers, and business partners?<br />
&nbsp;</p>
<p dir="ltr">
Neil finished his presentation by talking through how IBM Security have approached the <a href="http://www.ibm.com/mobile-enterprise" target="_blank">issues that organizations have faced with mobile security</a> and went through some use cases, including an electrical provider and a bank, to show how these policies have been implemented.<br />
&nbsp;</p>
<h2 dir="ltr">
Thinking like an attacker to make your defences better</h2>
<p dir="ltr">
In the first afternoon session we had Neil Warburton back again to present &ldquo;Thinking like an attacker to make your defences better&rdquo;. The audience this time nodded in approval with the slide presented on how organisations fail in terms of protecting themselves from a breach. With broader issues such as end users not thinking before they clicked on a suspect link or weak passwords, to the IT/Security team leaving hardware/software unpatched, Neil highlighted how easy it was for a breach to happen.<br />
&nbsp;</p>
<p dir="ltr">
He then went into detail on how security teams need to move from a reactive model to a proactive model, where situational awareness is required. This meant monitoring everything, all the time and related this to the <a href="http://www-03.ibm.com/software/products/us/en/category/SWI00#othertab0" target="_blank"><strong>IBM Security Systems framework</strong></a> of &quot;Intelligence, Integration, Expertise.&quot; Neil finished by talking about how IBM Security Systems will continue to focus on solving the big problems: Advanced Threats, Cloud Computing, Mobile Computing and Regulation &amp; Compliance and how our integrated portfolio can help to keep the attackers at bay.<br />
&nbsp;</p>
<h2 dir="ltr">
How to defend your network and keep attackers out with Security Intelligence</h2>
<p dir="ltr">
We finished the day with Rob Whitters, Senior Security Engineer for IBM Security Systems, who provided a great analysis of how to defend your network and most importantly keeping attackers out with Security Intelligence.<br />
&nbsp;</p>
<p dir="ltr">
Rob set the scene of what Security Intelligence is and why it is important by showing how complex the challenge for security teams is to identify what a true breach is. He highlighted how the workplace has developed with the use of Smartphones/tablets and increased social media profiling has made it even more of a headache for the security teams to track and react to issues before damage to their networks occur.<br />
&nbsp;</p>
<p dir="ltr">
Rob then went into details to talk about the <strong><a href="http://www.ibm.com/common/ssi/cgi-bin/ssialias?subtype=SP&amp;infotype=PM&amp;appname=SWGE_WG_WG_USEN&amp;htmlfid=WGD03023USEN&amp;attachment=WGD03023USEN.PDF" target="_blank">IBM QRadar Security Intelligence Platform</a></strong>, showing how the scalable, intelligent and integrated it is. He went through a number of use cases and supporting case studies to show the range of security problems that IBM QRadar Security Intelligence Platform can help to combat.<br />
&nbsp;</p>
<p dir="ltr">
With a snapshot of how the user interface looks, this provided some good discussion with the audience, especially with the use case of how the platform uses Application Layer 7 flow analysis to detect threats other miss.<br />
&nbsp;</p>
<h2 dir="ltr">
Stop by the IBM Security stand at Infosec Europe</h2>
<p dir="ltr">
To be updated on what is happening at Stand H80, with our awesome whiteboarding sessions or our four security workshops in room 1 (upstairs) please follow <a href="http://twitter.com/tomkendall1" target="_blank">@tomkendall1</a> and <a href="http://twitter.com/ibmsecurity" target="_blank">@IBMSecurity</a>.<br />
&nbsp;</p>
<p dir="ltr">
If you were unable to come to one of our workshops but are interested in what was discussed above, we will be posting all the presentations on <a href="http://ibm.co/1106Bdy">http://ibm.co/1106Bdy</a>. I look forward to bringing to you my thoughts tomorrow from day 3 of <a href="http://www-01.ibm.com/software/uk/security/infosec/index.html" target="_blank">Infosecurity Europe 2013</a>!</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr" style="text-align: center;">
<span style="font-size:16px;"><strong><span style="color: rgb(255, 0, 0);">Update</span>:<br />
<a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-one" target="_blank"><strong>R</strong>ead&nbsp;my&nbsp;thoughts&nbsp;from&nbsp;day&nbsp;1</a></strong></span><br />
<span style="font-size:16px;"><strong><a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-three" target="_blank" text="undefined"><strong>R</strong>ead&nbsp;my&nbsp;thoughts&nbsp;from&nbsp;day 3</a></strong></span></p>
<p dir="ltr">
&nbsp;</p>
<hr dir="ltr" />
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" style="display: block; margin: 1em 10px 0pt; float: left; width: 120px; height: 120px;" /></a><br />
<span style="font-size:18px;"><strong>Tom Kendall</strong></span></p>
<p dir="ltr">
Tom joined the IBM Security Systems marketing team through the acquisition of Q1 Labs team. He was the EMEA Marketing Team Lead for Q1 Labs and worked on the demand generation and channel partner marketing programmes. Tom moved into the WW Marketing team for IBM Security Systems and has been the lead for Demand Generation in Threat and Security Intelligence, and has taken on the role of the IMT first role for Europe. Before joining IBM, Tom worked for 8 years in the advertising industry in London, working on media strategies for large enterprise clients.</p>
<p dir="ltr">
&nbsp;</p>
<script language="javascript">
location.replace("http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/);
</script>
<meta http-equiv="refresh" content="0; url=http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/">
&nbsp;
IBM Security Systems had another great day at Infosecurity Europe, with good attendance at our stand for the hourly interactive graffiti whiteboarding sessions, which covered all the hottest security topics.
&nbsp;
In our workshops we had...002205urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-caaea28e-1f7b-487f-895b-2781bab2fe0dInfosecurity Europe 2013: Day 1 ThoughtsMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-04-23T21:32:56-04:002013-07-03T16:00:05-04:00<p dir="ltr">
<a href="http://www-01.ibm.com/software/uk/security/infosec/index.html" style="width: 100%; display: inline-block;" target="_blank"><img alt="IBM Security at Infosec Europe 2013" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/ibm-infosec-uk-europe_2013_day1.jpg" style=" display:block; margin: 0 auto;text-align: center;" /></a><br />
<br />
&nbsp;</p>
<p dir="ltr">
Wow, the end of a great first day at <a href="http://www-01.ibm.com/software/uk/security/infosec/index.html" target="_blank">Infosecurity Europe</a>. Our stand was very bright and impactful and with our industry experts, business partners and action packed agenda, it has been truly engaging day!<br />
&nbsp;</p>
<p dir="ltr">
We had four workshops across the day and below are the key points that I thought were raised.<br />
&nbsp;</p>
<p dir="ltr">
We opened with a packed room to hear Simon Smith, Technical Professional for IBM Security Systems, present the latest IT security trends and risks from the <a href="http://www.ibm.com/security/xforce/" target="_blank">IBM X-Force 2012 Annual Trend &amp; Risk Report</a>.&nbsp; Simon spoke about how from 2011 being the &ldquo;year of the targeted attack&rdquo;, 2012 has been &quot;the explosion of the breach continues.&quot;<br />
&nbsp;</p>
<p dir="ltr">
He then delved into the key findings, including how the exploitation of <strong>web application vulnerabilities rose 14% in 2012</strong> to more than 3,500 known issues and that <strong>43% of all reported vulnerabilities were led by Cross-site scripting (XSS) and SQL injection</strong>.<br />
&nbsp;</p>
<p dir="ltr">
An interesting discussion point within the room was Mobile computing is on track to be more secure than traditional computing by 2014. This has occurred due to the help of emerging technologies to encrypt, containerize and wipe data remotely. For more information on the reports findings, please go to the dedicated website <a href="http://www-03.ibm.com/security/xforce/">http://www.ibm.com/security/xforce/</a>.<br />
&nbsp;</p>
<p dir="ltr">
Next up was Brendan Byrne, Associate Partner and Privacy for IBM, talking about &ldquo;Security Implications of the use of Bigger and Smarter Data.&quot; Brendan started with delving into the topic of Big Data. He described how the explosion of new technologies, new business models being adopted and easier interconnectivity has led to organisations security risk increasing, due to the large amount of data being produced constantly. He then went into detail about IBM Security Intelligence with Big Data use cases, including:<br />
&nbsp;</p>
<ol dir="ltr">
<li>
How an internal compromised system can be detected from multiple data sources through IBM Security QRadar SIEM</li>
<li>
Detection of a malicious subnet<br />
&nbsp;</li>
</ol>
<p dir="ltr">
Brendan closed by identifying what the security challenges of using Big Data are, highlighting to the audience that they must make sure their organisations supply chain are all on the same page when it comes to Information Security.</p>
<p dir="ltr">
Learn more information on the <a href="http://www-03.ibm.com/security/solution/intelligence-big-data/" target="_blank">IBM Security Intelligence with Big Data offering</a> or download this <a href="http://insight.q1labs.com/ExtendingSecurityIntelligencewithBigData.html" target="_blank">Security Intelligence whitepaper</a>.<br />
&nbsp;</p>
<p dir="ltr">
Our afternoon session was kicked off by Stephen Williams, Principle Software Consultant for our business partner Pirean and Jon Harry, a senior IT security specialist at IBM, providing a great analysis of &quot;Identity and Access Management for the modern enterprise.&quot; Stephen set the scene by showing the audience why there is a requirement to move beyond authentication. He described how Identity and access management (IAM) needs to evolve to meet rapid and recent changes in service hosting, user interface design and business requirements.<br />
&nbsp;</p>
<p dir="ltr">
There was an interesting discussion regarding the new IAM requirements, including support for incremental change, support for &lsquo;B.Y.O.D&rsquo; and mitigating the need for &lsquo;role mining&rsquo;, which Stephen discussed why organisations must adapt. Jon then took over and went through <a href="http://www-03.ibm.com/software/products/us/en/subcategory/SWI20" target="_blank">how the IBM next generation identity and access management strategy supports these needs</a>.<br />
&nbsp;</p>
<p dir="ltr">
The final session of the day &ldquo;Thinking like an attacker to make your defences better&rdquo; was held by Neil Warburton, Security Architect for IBM. With people queuing out of the door to get in, we knew it was going to be an inspirational session. Neil immediately grabbed the audience&rsquo;s attention with some staggering facts, including 2,641,350 being the number of security attacks the average company faces per week. The severity and frequency of such attacks immediately caused discussion from the audience and led nicely into Neil&rsquo;s discussion on how an attacker exploits a breach. He started with showing how complex it is for an organisation to track and react to potential security threats and that an attacker usually uses the below 5 steps:<br />
&nbsp;</p>
<ol dir="ltr">
<li>
Break in</li>
<li>
Load Malware</li>
<li>
Expand</li>
<li>
Gather Data</li>
<li>
Exfiltrate<br />
&nbsp;</li>
</ol>
<p dir="ltr">
Neil then highlighted to the audience how they needed to think differently about security by collecting and analyzing everything. The collection of information is just the tip of the iceberg but the key is to analyse the information intelligently. Click here to find out more about <strong><a href="http://www.ibm.com/security" target="_blank">IBM Security</a></strong>.<br />
&nbsp;</p>
<p dir="ltr">
To be updated on what is happening at Stand H80, with our awesome whiteboarding sessions or our four security workshops in room 1 (upstairs) please follow <a href="http://twitter.com/tomkendall1" target="_blank">@tomkendall1</a> and <a href="http://twitter.com/ibmsecurity" target="_blank">@IBMSecurity</a>.<br />
&nbsp;</p>
<p dir="ltr">
If you were unable to come to one of our workshops but are interested in what was discussed above, we will be posting all the presentations on <a href="http://ibm.co/1106Bdy">http://ibm.co/1106Bdy</a>. I look forward to bringing to you my thoughts tomorrow evening from <a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-two" target="_blank">day 2 of </a><a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-two" target="_blank">Infosecurity Europe 2013</a>!</p>
<p dir="ltr" style="text-align: center;">
<br />
<span style="font-size:16px;"><strong><span style="color: rgb(255, 0, 0);">Update</span>: </strong></span><br />
<span style="font-size:16px;"><strong><a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-two" target="_blank">Read&nbsp;my&nbsp;thoughts&nbsp;on&nbsp;day&nbsp;2&nbsp;of&nbsp;Infosecurity&nbsp;Europe&nbsp;2013</a></strong></span><br />
<span style="font-size:16px;"><strong><a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/entry/ibm-security-at-infosec-europe-2013-day-three" target="_blank">Read&nbsp;my&nbsp;thoughts&nbsp;on&nbsp;day&nbsp;3&nbsp;of&nbsp;Infosecurity&nbsp;Europe&nbsp;2013</a></strong></span></p>
<p dir="ltr">
&nbsp;</p>
<hr dir="ltr" />
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
<a href="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/tomphoto.jpg" style="display: block; margin: 1em 10px 0pt; float: left; width: 120px; height: 120px;" /></a><br />
<span style="font-size:18px;"><strong>Tom Kendall</strong></span></p>
<p dir="ltr">
Tom joined the IBM Security Systems marketing team through the acquisition of Q1 Labs team. He was the EMEA Marketing Team Lead for Q1 Labs and worked on the demand generation and channel partner marketing programmes. Tom moved into the WW Marketing team for IBM Security Systems and has been the lead for Demand Generation in Threat and Security Intelligence, and has taken on the role of the IMT first role for Europe. Before joining IBM, Tom worked for 8 years in the advertising industry in London, working on media strategies for large enterprise clients.</p>
<p dir="ltr">
&nbsp;</p>
<script language="javascript">
location.replace("http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/);
</script>
<meta http-equiv="refresh" content="0; url=http://securityintelligence.com/infosecurity-europe-2013-thoughts-and-highlights-from-conference/">
&nbsp;
Wow, the end of a great first day at Infosecurity Europe . Our stand was very bright and impactful and with our industry experts, business partners and action packed agenda, it has been truly engaging day!
&nbsp;
We had four workshops...002612urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-3c6b86dd-2fd6-4a56-9865-5cce6b5cd053Security at IBM Impact 2013Marcel Santillimsantil@us.ibm.com270002FABMactiveComment Entriesapplication/atom+xml;type=entryLikes2013-04-23T09:38:00-04:002013-04-23T09:38:00-04:00<p dir="ltr">
Did you know <a href="http://www.ibm.com/security" target="_new">IBM Security</a> offers one of the world&rsquo;s broadest, most advanced and integrated enterprise security product and service portfolios?<br />
&nbsp;</p>
<p dir="ltr">
IBM Security&rsquo;s portfolio, supported by world-renowned <a href="http://www-03.ibm.com/security/xforce/" target="_new">IBM X-Force</a> research and development, provides the security intelligence to help organizations holistically protect their people, infrastructure, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more.<br />
&nbsp;</p>
<p dir="ltr">
This enables organizations to more effectively manage risk and implement integrated security solutions for mobile, cloud, social media and other enterprise business architectures.</p>
<p dir="ltr">
&nbsp;</p>
<h1 dir="ltr">
Security at Impact 2013</h1>
<p dir="ltr">
Learn more about IBM Security&rsquo;s products and services at IBM Impact 2013. We will have a strong presence at Impact this year, including:<br />
&nbsp;</p>
<ul dir="ltr">
<li>
A Security Zone in the Solution Center</li>
<li>
8 different security specific sessions covering topics from Securing Mobility to Security Intelligence to Securing Cloud and Web Applications</li>
<li>
97 other sessions have security as a topic!&nbsp;<br />
&nbsp;</li>
</ul>
<p dir="ltr">
Come interact with the actual folks implementing advanced technologies to better understand the security concerns these topics open up and how IBM can help address them. Find more details below and search for &#39;security&#39; in you agenda builder for even more sessions.</p>
<p dir="ltr">
&nbsp;</p>
<h1 dir="ltr">
<strong>Top Security Sessions at IBM Impact:</strong></h1>
<p dir="ltr">
Below are some of the top security sessions at IBM Impact 2013 that you do not want to miss:<br />
&nbsp;</p>
<h3 dir="ltr" style="margin-left: 40px;">
<strong>Do you have a pulse of your security and risk posture?</strong></h3>
<p dir="ltr" style="margin-left: 40px;">
Security has become a board room discussion as it impacts business and IT. Whether your risks are due to advanced threats, mobile access, cloud infrastructure, compliance issues, or you&#39;re looking to analyze big data for security insights, you need to assess your posture and apply a set of security capabilities to deal with that security challenge. This session will discuss how capabilities across People, Data, Application, Infrastructure and Security Intelligence can help you proactively manage your security and risk posture.<br />
<strong>Session Number:</strong> TCS-3167<br />
<strong>Speaker(s):</strong> Nataraj Nagaratnam, IBM<br />
<strong>When:</strong> Mon, 29/Apr, 10:30 AM - 11:45 AM<br />
<strong>Where:</strong> Venetian - Palazzo M</p>
<p dir="ltr" style="margin-left: 40px;">
&nbsp;</p>
<h3 dir="ltr" style="margin-left: 40px;">
<strong>Who Do You Know, and Who Do You Trust?</strong></h3>
<p dir="ltr" style="margin-left: 40px;">
The concept of identity as authority is ages old, but today&#39;s highly connected and socially networked environment has created multiple identities for most users. Some identify most strongly with social platforms, others adhere to their organizational identity, while many are still rooted in their physical persona as represented by driver&#39;s licenses and passports. This session will discuss the role of identity and access in today&#39;s world, as well as an approach to apply them in addressing trends around cloud, mobile and identity intelligence.<br />
<strong>Session Number:</strong> TCS-3168<br />
<strong>Speaker(s):</strong> Sridhar Muppidi, IBM; Ravi Srinivasan, IBM<br />
<strong>When:</strong> Tue, 30/Apr, 05:15 PM - 06:15 PM<br />
<strong>Where:</strong> Venetian - Palazzo M</p>
<p dir="ltr" style="margin-left: 40px;">
&nbsp;</p>
<h3 dir="ltr" style="margin-left: 40px;">
<strong>Security for Mobile Devices, Applications and Information</strong></h3>
<p dir="ltr" style="margin-left: 40px;">
Organizations want to provide users the option of using a mobile devices to allow them to work wherever/whenever they need to, but doing so requires diligence in protecting sensitive data for compliance. Organizations are now tasked with supporting the new social, virtual, and mobile users and the applications they access. With mobile threats on the rise, complex IT environments, and maintaining policies are top of mind concerns for many security and risk professionals. This session will provide insight into how organizations can manage their risk by taking steps to manage these mobile devices, protect sensitive data with IBM Security solutions. The session will include a demonstration of IBM WorkLight, ISAM and IEM working together.<br />
<strong>Session Number:</strong> TMB-2948<br />
<strong>Speaker(s):</strong> Vijay Dheap, IBM; Sridhar Muppidi, IBM; Nataraj Nagaratnam, IBM<br />
<strong>When:</strong> Wed, 1/May, 01:00 PM - 02:00 PM<br />
<strong>Where:</strong> Venetian - Palazzo K</p>
<p dir="ltr">
&nbsp;</p>
<p dir="ltr">
If you have any questions or want to see the latest from IBM Security, <a href="http://twitter.com/ibmsecurity" target="_new"><strong>follow us on Twitter</strong></a>.</p>
Did you know IBM Security offers one of the world&rsquo;s broadest, most advanced and integrated enterprise security product and service portfolios?
&nbsp;
IBM Security&rsquo;s portfolio, supported by world-renowned IBM X-Force research and...003300urn:lsid:ibm.com:blogs:entries-3404f8c4-d29c-4d8e-a7dd-f93b13530a6bIBM Impact Blog2015-03-02T21:16:06-05:00urn:lsid:ibm.com:blogs:entry-aea60732-9dfb-4195-813e-1926220a3fd5New report analyzes and explores latest security threats and trendsMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-03-28T14:04:41-04:002013-04-01T09:38:14-04:00<div><a href="/jct03001c/security/xforce/" target="_blank"><img alt="IBM X-Force 2012 Annual Trend and Risk Report" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/ibm-x-force_xforce-report_security-infosec.jpg
" style=" display:block; margin: 0 auto;text-align: center; position:relative;"></a></div><div><h1><font color="#dc143c">NEW!</font> IBM X-Force 2012 Annual Trend and Risk Report</h1></div><br><div><p>Twice a year since the late 1990s, <a href="/jct03001c/security/xforce/" target="_blank">IBM’s X-Force Research and Development team</a> releases a trend and risk report including content collected from dozens of thought leaders across the company.&nbsp; Its findings, analyses and predictions come from working with our thousands of clients and leveraging vast database resources of publicly disclosed security vulnerabilities, IP reputations, and details behind historical spam and phishing attacks.&nbsp; The report amounts to required reading for security professionals charged with safeguarding your company’s intellectual property, corporate data and private customer data.&nbsp;</p><div>&nbsp;</div> <br><br><br><p>It’s difficult to summarize all the important content in a single statement; nevertheless, we noticed what we believed to be a central theme associated with achieving the maximum impact by expending the least possible effort.&nbsp; Many of the targets selected were broad in nature, and the tools and techniques used in the attacks amounted to off-the-shelf technology.&nbsp; No need to go to extreme measures when login credentials could easily be compromised on users quickly duped into clicking on bad links or opening malicious code sent via email attachments.</p><div>&nbsp;</div></div><br><a href="http://ibm.co/xforce12" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/download-ibm-xforce-report-security.jpg
" style=" display:block; margin: 0 auto;text-align: center; position:relative;"></a> <br><br><div><p>For example, we examined the role of web browser exploit kits and how quickly they appeared after the vulnerabilities were identified.&nbsp; More exploit kits were readily available in 2012, and the primary driver was the Java Content Management System—especially for its add-ons.&nbsp; Despite the availability of patches, attackers took advantage of the infrequency of organizational and individual patch applications to great success.&nbsp; Java also had the unique appeal of being a cross platform and multi-browser attack opportunity.</p><div>&nbsp;</div><br><br><br><p>We also saw increasing sophistication in Denial of Service (DDoS) attacks and the continued effectiveness of SQL Injection and Cross-site scripting approaches leading us to conclude that 2012 was a year where attackers achieved a higher return on their exploit development efforts.&nbsp; Find out more about these important issues by downloading a copy of the<b> <a href="http://ibm.co/xforce12" target="_blank">IBM X-Force 2012 Annual Trend and Risk Report</a> </b>today.</p><div>&nbsp;</div></div><div>&nbsp;</div><div>Follow <a href="http://twitter.com/ibmsecurity" target="_blank">IBM Security on Twitter</a> for the latest news. </div><div>&nbsp;</div><div>- <br></div><br><br><br><br><br>
NEW! IBM X-Force 2012 Annual Trend and Risk Report Twice a year since the late 1990s, IBM’s X-Force Research and Development team releases a trend and risk report including content collected from dozens of thought leaders across the company.&nbsp; Its...006205urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-60310ed5-e3e9-4920-bd6b-ce27c94c8989You may have ‘Big Data’ and not know it… can you protect it?Marcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-03-26T14:08:26-04:002013-03-26T14:11:22-04:00<div><img alt="Big Data Security" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/big-data-protect-it-security.jpg
" style=" display:block; margin: 1em 1em 0pt 0pt; float: center; position:relative;">&nbsp; <br></div><h1><b>You may have ‘Big Data’ and not know it… can you protect it? </b></h1><div>&nbsp;</div>
<p>To many security executives the word “Big Data” seems to being something that someone else has and thus not applicable to ones own enterprise.&nbsp; Many Security managers assume that their own data-center is traditional and that ‘Big Data’ is something that enterprises like Amazon or Google use. &nbsp;Such thinking cannot be further from the truth.&nbsp;&nbsp; With the rise in machine-to-machine (M2M) communication, i.e. interconnectivity, there is a huge rise in the data that is available and logged.&nbsp; So if you have website and have logs of all the activity on the website then you certainly have ‘big data’.</p><div>&nbsp;</div>
<h1>Four characteristics of Big Data</h1><div>&nbsp;</div>
<p>There are four characteristics of Big Data: </p>
<ol>
<li>Volume </li>
<li>Velocity </li>
<li>Variety </li>
<li>Veracity</li>
</ol>
<div>&nbsp;</div><p>Phew&nbsp; – we now have the play on the words out of the way!</p><div>&nbsp;</div>
<p>Even the most conservative enterprise has a huge amount of log files that can provide great insight into their own operations or customer needs.&nbsp;As organizations try to ingest and manage this useful data, there is also the implication that this data is useful to anyone who can break in and access this data.&nbsp;Organizations also need to be aware that much of this data could be sensitive data such as financial, health, and personal or other types of sensitive information that are&nbsp;subject to regulations or even sensitive to the business like revenue data.</p><div>&nbsp;</div>
<h1>What does that mean in terms of security?</h1><div>&nbsp;</div>
<p>This means that security professionals need processes in place that promote compliance and security. You should put systems in that that will protect both your traditional structured data (like the ones that you have in your database) as well as the unstructured data (examples are your log files, video and other document files).&nbsp; Having a common solution that would let you monitor the different kinds of data – Big or&nbsp; traditional, as well as provide you with ‘Intelligence’ for the entire organization is something that is very doable. </p><div>&nbsp;</div>
<p>For instance, InfoSphere Guardium Data Activity Monitoring secures both the Big data and traditional data. It is directly integrated and shares information with IBM’s Security’s QRadar to provide enterprise wide intelligence on the security posture. </p><div>&nbsp;</div>
<p>Check out these links for more information on how to get more out of Big data and also protect Big Data…</p><p><br></p>
<ul>
<li><a href="http://blog.q1labs.com/2013/01/31/mining-big-data-for-better-security-intelligence/" target="_new">Mining Big Data for Better Security Solutions</a></li>
<li><a href="http://www-142.ibm.com/software/products/in/en/category/SWI00" target="_new">The need for security intelligence</a></li>
<li><a href="/software/data/guardium/secure-big-data/" target="_new">Secure and Protect Big Data</a></li>
<li><a href="/software/data/guardium/" target="_new">IBM Security InfoSphere Guardium</a></li>
</ul>
<p>&nbsp;</p><div>Post by <b><a href="http://www.linkedin.com/pub/sudhee-subrahmanya/0/172/a73">Sudhee Subrahmanya</a></b><br><br><br></div>
&nbsp; You may have ‘Big Data’ and not know it… can you protect it? &nbsp;
To many security executives the word “Big Data” seems to being something that someone else has and thus not applicable to ones own enterprise.&nbsp; Many Security managers assume...006239urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-abf7828c-f4b6-495a-8e4b-698598816572Top 3 Basic Considerations to Secure the CloudMarcel Santillimsantil@us.ibm.com270002FABMactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment Entriesapplication/atom+xml;type=entryLikes2013-03-13T17:46:45-04:002013-07-05T14:59:43-04:00<div align="center" dir="ltr">
<i>Post by </i><b><a href="https://twitter.com/VikashAbraham">Vikash Abraham</a></b><i>, Product Marketing Manager for IBM Security Solutions</i></div>
<div dir="ltr">
<img alt="Three things to consider to secure the Cloud by Vikash Abraham, IBM Security" src="https://www-304.ibm.com/connections/blogs/bcde08b8-816c-42a8-aa37-5f1ce02470a9/resource/BLOGS_UPLOADED_IMAGES/3-considerations-to-secure-cloud.jpg
" style=" display:block; margin: 0 auto;text-align: center; position:relative;" /></div>
<p dir="ltr">
<br />
While Cloud has been clearly identified as the next step to IT optimization, essential for increased performance and cost reduction, many of us are in a haze when it comes to the fundamental security measures required.<br />
&nbsp;</p>
<p dir="ltr">
Our fears related to cloud security, for e.g the fear of the unknown ( where is my data stored?) and the fear of the unseen (how does my data flow from one Virtual Machine to another) and the fear of how &lsquo;secure&rsquo; the cloud really is lead us to be wary of cloud adoption. Also the new layers of infrastructure create new grey areas, requiring new security solutions such as <a href="/software/tivoli/products/virtual-server-protection/">Virtual Server Protection</a> for specific protection.<br />
&nbsp;</p>
<h1 dir="ltr">
Basic components of Cloud and ways to optimize their security<br />
&nbsp;</h1>
<p dir="ltr">
Even though the Cloud uses a different mechanism to serve IT infrastructure, be it computing power, memory or storage, the elements that create a cloud still include traditional datacenter components - servers, network, nodes and endpoints. The risks that exist in traditional data centers are also relevant in a cloud environment. Hence, traditional protection solutions such as Firewalls, IPS and Anti-viruses for physical hosts are essential to secure the cloud too. But how do we get smart in customizing traditional solutions to adapt to the requirements of the cloud?<br />
&nbsp;</p>
<h1 dir="ltr">
Three cloud scenarios and the relevant host security features<br />
&nbsp;</h1>
<p dir="ltr">
<b>1) Heterogeneous components</b>: The Cloud is about heterogeneous components coming together to serve as a single standard entity: this would mean that the host environment in a typical cloud would include different types of endpoints running different OS platforms. If separate security products are needed for different OS systems, it would become an administration and configuration nightmare. Hence, a single host protection solution that can support many platforms could reduce considerable effort and cost.<br />
&nbsp;</p>
<p dir="ltr">
<b>2) Distributed resources:</b> The Cloud is about a large number of distributed resources working together: this would mean a large number of endpoints at different locations that need to be managed, configured and secured. Again, an administrative nightmare to track and maintain security policies across these endpoints. Here, centralized security management of endpoints needs to be a part of the security solution.<br />
&nbsp;</p>
<p dir="ltr">
<b>3) Multiple technology layers:</b> The Cloud is also about multiple technology layers that work seamlessly: the higher the number of layers, the more the chances of gaps and vulnerability. Hackers identify easy entry points and don&rsquo;t limit themselves to one point of entry. Using techniques such as &lsquo;Advanced Persistent Threats&rsquo;, they attack through multiple vectors. Security administrators need to ensure that they stay ahead of the hacker and secure the infrastructure from organized attacks. &nbsp;It is essential to implement a security product that can not only do its specified point job, but can <a href="http://www-142.ibm.com/software/products/us/en/subcategory/SWI60" target="_new">communicate with other security components</a>. This integrated approach will enable identification and blocking of advanced threats to the cloud.<br />
&nbsp;</p>
<p dir="ltr">
I look forward to your thoughts, queries and comments. Watch out for upcoming blogs that will feature relevant <a href="http://www-142.ibm.com/software/products/us/en/category/SWI00" target="_new">IBM Security solutions</a> to help you resolve these issues.<br />
&nbsp;</p>
<p dir="ltr">
Learn more about how <a href="http://www-142.ibm.com/software/products/us/en/ibmsecuhostprot" target="_new">IBM Security&rsquo;s Host Protection solutions address cloud security</a>.<br />
&nbsp;</p>
<script language="javascript">
location.replace("http://securityintelligence.com/top-3-basic-considerations-to-secure-the-cloud/);
</script>
<meta http-equiv="refresh" content="0; url=http://securityintelligence.com/top-3-basic-considerations-to-secure-the-cloud/">Post by Vikash Abraham , Product Marketing Manager for IBM Security Solutions
While Cloud has been clearly identified as the next step to IT optimization, essential for increased performance and cost reduction, many of us are in a haze when it...0012477urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-cd51d1c5-a88c-4bee-87ae-4770acb080cd“Big Data” - The 2012 Word of the YearMelissa StevensMELISSAS@US.IBM.COM270005B76Wactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment EntriesLikes2012-12-28T11:27:56-05:002012-12-28T11:27:56-05:00<p>This post is contributed by Kim Madia, World Wide Product Marketing Manager for Infosphere.</p>
<p>Working at IBM, I have been fortunate enough to be a part of launching big data platforms to clients. Big data is more than simply a matter of size; it is an opportunity to find insights in new and emerging types of data and content, to make businesses more agile, and to answer questions that were previously considered beyond reach.
</p><p>Living in the technology space, terms like sentiment analysis, analytics, and high velocity data are becoming familiar. However, it is interesting for me to see how those outside of the technology business are engaging in the big data phenomenon. Geoff Nunberg, teacher at the University of California at Berkeley, recently made a case for big data as the <a href="http://www.npr.org/2012/12/20/167702665/geoff-nunbergs-word-of-the-year-big-data">2012 word of the year</a>. Another example, The New York Times has ran articles about how the US held its first “<a href="http://www.nytimes.com/2012/11/13/us/politics/obama-data-system-targeted-tv-viewers-for-support.html?_r=0">big data presidential election</a>” in 2012.
</p><p>One topic that is picking up steam in popular media, and I expect will get even greater focus in 2013, is privacy. In this era of big data, understanding privacy couldn’t be more important. Privacy isn’t static and can’t be easily defined. Privacy also has different meanings across businesses, industries and cultures. Privacy rules therefore are a constant source of debate. For example, a person’s zip code might want to be kept private during a trip to a health care clinic but may want to be disclosed to a retail establishment.
</p><p>Sometimes privacy is confused with security or anonymity. Though related, these terms are not the same. Privacy is defined as the ability to control use of information in different contexts.
</p><p>Technology is available to help deliver privacy. Intelligent data masking inside big data platforms makes analytics possible while also keeping private information out of sight. A focus on privacy will fundamentally change how big data platforms are adopted. The end goal is to provide aggregated sensitive data to an analytics platform while protecting privacy. I believe in 2013 we will see more debate between IT professionals and governance regulators about how to create more effective privacy policies.
</p><p>To learn more about data masking, you might be interested in this analyst research: <a href="https://www14.software.ibm.com/webapp/iwm/web/signup.do?lang=en_US&amp;source=sw-infomgt&amp;S_PKG=ov6102&amp;S_CMP=Optim_Securosis_select_data_masking_an_lib">Understanding and Selecting Data Masking Solutions</a>.
</p><p>IBM delivers intelligent data masking through the <a href="http://www.ibm.com/software/data/optim/protect-data-privacy/">InfoSphere Optim Data Masking portfolio</a>.
</p><p>***<br>
Get more security news by following <a href="http://www.twitter.com/ibmsecurity">@IBMSecurity</a> on Twitter.
</p>This post is contributed by Kim Madia, World Wide Product Marketing Manager for Infosphere.
Working at IBM, I have been fortunate enough to be a part of launching big data platforms to clients. Big data is more than simply a matter of size; it is an...104767urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-d0236adc-1129-4859-a704-f2eee1c5bb22Drawing Big Data Insights from a Security Intelligence CloudMelissa StevensMELISSAS@US.IBM.COM270005B76Wactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment EntriesLikes2012-11-20T15:45:36-05:002012-11-20T15:46:51-05:00<p><i>This is an excerpt from a post on the <a href="http://www.blog.q1labs.com">Q1 Labs Security Intelligence blog</a>, contributed by Michael Applebaum, Director of Product &amp; Segment Marketing at IBM Security Systems.&nbsp; You can follow him on Twitter at <a href="http://www.twitter.com/ma08">@ma08</a>.</i></p>
<blockquote><p>If you want to skate to where the puck is going in security today, it’s best to think big – as in Big Data. To detect stealthy breaches by advanced adversaries, you need to analyze a greater volume and variety of data, at a greater velocity – the so-called “<a href="http://en.wikipedia.org/wiki/Big_data#Definition">3 V’s” of Big Data</a>. Big Data analytics is as critical to security as to any other field, because it holds the promise of analyzing data sets too large to process in the past – in other words, solving previously unsolvable problems. In this way, it can help discover insights – such as security compromises or malicious behavior – that would have otherwise lay hidden.</p><p>The best way to obtain security analytics at Big Data scale is with a purpose-built security intelligence architecture that can scale to meet your needs, unpredictable as they might be. You want a solution that can expand as your business grows, as you analyze new types of security data, and as your security process maturity increases. One requiring minimal administration but offering maximum flexibility. In other words, a security intelligence cloud.</p><p>Just what is a <a href="http://q1labs.com/products.aspx">security intelligence</a> cloud? (No, it’s not a cloud-delivered security intelligence solution.)</p></blockquote>
<p><a href="http://blog.q1labs.com/2012/11/20/drawing-big-data-insights-from-a-security-intelligence-cloud/">Click here</a> to read the rest of this blog post, and to learn about the building blocks of security intelligence.</p>
<p>Follow <a href="http://www.twitter.com/ibmsecurity">@ibmsecurity</a> on Twitter to get the latest security news.</p>
This is an excerpt from a post on the Q1 Labs Security Intelligence blog , contributed by Michael Applebaum, Director of Product &amp; Segment Marketing at IBM Security Systems.&nbsp; You can follow him on Twitter at @ma08 .
If you want to skate to where...003408urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-d108e55c-0ec0-49d6-8d37-425f27c1c60cThe expanding role of endpoint managementMelissa StevensMELISSAS@US.IBM.COM270005B76Wactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment EntriesLikes2012-11-19T15:04:02-05:002012-11-19T15:09:27-05:00<i>This post was contributed by Richard Mayo, <span class="bio">WW Product Marketing Manager - Tivoli Endpoint Manager.</span></i>
<p>Just a few years ago the endpoint management domain was most PCs and laptops. Now multiple forces are at work, driving IT to manage a plethora of new endpoints.</p>
<p>The most obvious examples are mobile endpoints and the Bring Your Own Device (BYOD) phenomena. End users are demanding, and for the most part receiving, access to corporate networks from their smart phones, iPads and android devices. The flexibility and connectivity that mobility brings can make an organization more agile and responsive. But it also can make an organization vulnerable. Devices that are small and constantly on-the-go face loss, theft or damage, while devices that operate via remote connectivity risk infection, corruption or hacking. IT is faced with a number a new challenges, for example, the need to detect rooted or jail-broken devices and automatically take countermeasures, selectively wiping corporate data if a device is lost or stolen and configuring and enforcing password policies, encryption and camera use. </p>
<p>Another related new role is balancing the need for remote data access that end uses are requesting with the data security requirements the business demands. Having applications running on a mobile device that are downloading sensitive corporate data can quickly lead to problems. A number of companies are discovering that virtual desktop technology can provide the solution to this dilemma. A virtual desktop is started on the mobile device which then accesses the application and data on a remote system. This keeps the data securely behind the firewall while giving end users access to the information they need.</p>
<p>The third area is managing the rapid rise in virtualized and cloud based server endpoints. There are three major challenges in this area related to endpoint management.</p>
<p>The first is the physical deployment of the servers. This involves automating everything from the basic server set up which involves, for example, defining DNS settings, host name and disk partitions to the delivery of images that provide the middleware and applications.</p>
<p>Once the server is set up standardization is the key to gaining efficiencies from virtualization. Users are often unwilling to consolidate their images because they perceive them as being too different. Administrators typically don’t have the time or the tools to demonstrate otherwise which has resulted in many organizations having several hundred images to manage. The number of images the data center will have to manage is expected to double over the next several years as virtualization becomes more pervasive. IT needs capabilities that analyze the image database, rank the images by similarity, then list the differences, including release level, giving administrators the confidence they need to consolidate images without disrupting the business.</p>
<p>Lastly, effective patch delivery is key to maintaining virtual machine security. IT needs to deploy patches to all the appropriate virtual servers in the cloud—however many there may be, even though that number is constantly in a state of flux. IT needs to continually know both how many virtual servers there are, and what software is driving them— so that it can determine which virtual servers need to be patched.</p>
<p>All of these expanded endpoint management functions need an integrated and automated solution. For more information on these challenges and solutions see our upcoming Webcast, "<a href="http://b2b.ziffdavis.com/webcasts/expanding-role-endpoint-management/">The Expanding Role of Endpoint Management</a>."</p><div>&nbsp;</div><div>Connect with &lt;a href="http://www.twitter.com/ibmsecurity"&gt;@IBMSecurity&lt;/a&gt; on Twitter to stay current on security news! <br></div>
This post was contributed by Richard Mayo, WW Product Marketing Manager - Tivoli Endpoint Manager.
Just a few years ago the endpoint management domain was most PCs and laptops. Now multiple forces are at work, driving IT to manage a plethora of new...105138urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-c9b9484c-7cff-4902-aefc-c46aeb93c004Defense in Depth, Part 2: Addressing today’s advanced security threatsMelissa StevensMELISSAS@US.IBM.COM270005B76Wactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment EntriesLikes2012-11-16T10:46:59-05:002012-11-27T14:03:15-05:00<p><i>This post is written by Nick Harlow, Product Manager - Server Security and Security Content Analysis for IBM Security. </i></p>
<p>In <a href="http://ibm.co/SzPhq2">part one</a> of this series, we defined the term advanced persistent threat, outlined the threats organizations face today from both increasingly sophisticated attackers and careless or malicious insiders. Furthermore, we saw how traditional IT security approaches left organizations exposed in this more dangerous IT security landscape. In this installment, we will examine how defense in depth can provide a multi-layered approach to security that provides organizations with both the flexibility to operate as needed and the ability to reduce exposure to serious business and IT security risks they face from advanced attackers.</p>
<p>In order to address the threat from advanced malicious attackers and insiders, organizations should take the following steps:
<br></p><ol><li>Author and enforce sufficiently strong security policies at all critical points of the IT infrastructure. </li><li>Ensure complete visibility of the environment from the physical facilities, to the network perimeter, and down to the host OS, file system, and application layer. </li><li>Continuously monitor the environment for anomalous behavior and take appropriate actions when this behavior is detected.</li></ol><p>
</p><p>We can refer to this approach to IT security as defense-in-depth. At the network layer, defense in depth means not only blocking unwanted traffic using a firewall, but also inspecting both ingress and egress network traffic on otherwise legitimate communications channels. Attackers use common protocols and open ports to hide attack traffic; the only way to detect it is to be able to see it, understand its context, and extrapolate the correct insights. Solutions that provide these capabilities may provide the following capabilities: </p><ul><li>Packet filtering -- Firewalls filter packets to block unwanted traffic </li><li>Deep packet inspection – Intrusion prevention systems inspect each network packet to detect either network protocol vulnerabilities, malicious payloads, or attack signatures </li><li>URL filtering – Categorize URLs by content and disallow risky categories (e.g. erotic, software piracy) </li><li>IP reputation and network geolocation – Legitimate IP addresses can be temporarily compromised as attackers will take advantage of momentary vulnerability to compromise a target system. IP reputation assesses the risk of a given address, while geolocation can pinpoint the geographic origin of traffic.</li></ul>
<p>Administrators can apply these technologies at the perimeter layer as well as the host network layer and use different policies with each in order to provide the level of flexibility, visibility and protection required at each point in the IT environment. However, defense in depth does not stop with the network layer. Organizations should have visibility at the operating system, file system, and application layer of their environments as well. Host security solutions can facilitate this by providing the following capabilities: </p><ul><li>OS and file system monitoring – Enables detection of unwanted behavior by integrating with OS audit subsystems. In addition, this mechanism allows for the specification of critical or sensitive files to be monitored for unauthorized access. </li><li>Antimalware – Although many advanced attacks exploit zero-day vulnerabilities, antimalware can still provide some useful protection against known malware types. </li><li>Device control – Enforcing usage policy on devices such as printers and portable USB storage can help to stop unauthorized disclosure or theft of proprietary data. </li><li>Data loss prevention – Uses pattern matching to detect confidential or proprietary data both at rest and in transit and can block the transmission of these data accordingly.</li></ul>
<p>Today’s complex, multi-layered IT environments face advanced, growing threats from motivated and sophisticated attackers. Failure to address this security and IT governance challenge effective can result in disruption of operations, loss of productivity, the dissipation of competitive advantage, embarrassing and expensive data breaches, and loss of revenue and customers. Defense in depth can help significantly to mitigate these risks.<a href="http://www.ibm.com/software/products/us/en/subcategory/SWI30"> IBM Security Systems threat management solutions</a>&nbsp; can help to provide defense in depth capabilities for today’s IT environments, while minimizing the cost and complexity of security. Also learn more about IBM’s latest offering in <a href="http://www.ibm.com/software/products/us/en/ibmsecuhostprot">Host Security</a>.</p>
<p>Watch <a href="http://bit.ly/Qo5Rwy">this video</a> to learn more about the IBM Security Advanced Threat Protection Platform.</p>
<p>***<br>
Get more security news by following <a href="http://www.twitter.com/ibmsecurity">@IBMSecurity</a> on Twitter.</p>
This post is written by Nick Harlow, Product Manager - Server Security and Security Content Analysis for IBM Security.
In part one of this series, we defined the term advanced persistent threat, outlined the threats organizations face today from both...105105urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00urn:lsid:ibm.com:blogs:entry-f9778358-a508-4cf4-b078-22e9f5118e7fAre you ready for BYOD? IBM can help!Melissa StevensMELISSAS@US.IBM.COM270005B76Wactivebcde08b8-816c-42a8-aa37-5f1ce02470a9Comment EntriesLikes2012-11-14T10:13:25-05:002012-11-14T10:13:25-05:00<p><i> This post was written by Perry Swenson, Segment Manager for IBM Security. </i></p>
<p>Adoption of new technology has historically started within IT, and then slowly made its way to consumers. But mobile technologies have reversed that pattern. All types of organizations are now trying to rapidly understand how to support the influx of mobile devices that employees want to use to access business applications and resources.</p>
<p>A big challenge is determining how to manage and mitigate the risks associated with mobile interactions. Security for mobile devices can be significantly different from security for traditional endpoints, because the mobile devices themselves are different.</p>
<p>To help organizations meet this challenge, IBM has developed a portfolio of mobile security solutions that span the users, data, applications and infrastructure. IBM capabilities emphasize an adaptive approach to security that can also help organizations drive down the costs of securing a mobile environment.</p>
<p>One of the solutions within the IBM portfolio is <b>IBM Endpoint Manager for Mobile Devices</b>. This solution helps provide visibility across the organization while safeguarding data. It provides visibility by discovering which mobile devices are connected to the network, and then capturing details for each device.</p>
<p>It safeguards data in several ways, including detecting security threats, and then automatically taking countermeasures. It can selectively wipe organizational data when a device is lost or stolen, and it can enforce organizational security best practices, such as password policies. IBM Endpoint Manager can also automatically identify a non-compliant mobile device, and disable access to organizational resources until corrective actions are implemented.</p><p>
</p><p>And for your IT staff, a key benefit is being able to use IBM Endpoint Manager as a single solution to manage and secure all endpoints, including desktops, laptops and servers, in addition to your mobile devices.</p>
<p>To learn more about how IBM can help your organization control and secure mobile devices, please visit us <a href="http://www.ibm.com/software/products/us/en/ibmendpmanaformobidevi">here</a>.</p>
<p>Get more security news by following <a href="http://www.twitter.com/ibmsecurity">@IBMSecurity</a> on Twitter.</p>
This post was written by Perry Swenson, Segment Manager for IBM Security.
Adoption of new technology has historically started within IT, and then slowly made its way to consumers. But mobile technologies have reversed that pattern. All types of...103527urn:lsid:ibm.com:blogs:entries-97050e2c-bec8-4274-a3ee-4432f0a1f4bcIBM Software Community2015-02-03T09:57:50-05:00